Cyber Posture

CVE-2026-21511

HighRCE

Published: 10 February 2026

Published
10 February 2026
Modified
11 February 2026
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
EPSS Score 0.0024 46.8th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-21511 is a high-severity Deserialization of Untrusted Data (CWE-502) vulnerability in Microsoft Office Long Term Servicing Channel. Its CVSS base score is 7.5 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Email Spoofing (T1672); ranked at the 46.8th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

Threat & Defense at a Glance

What attackers do: exploitation maps to Email Spoofing (T1672).
Threat & Defense Details

Likely Mitigating ControlsAI

Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.

addresses: CWE-502

Penetration testing supplies malicious serialized objects, detecting unsafe deserialization and supporting corrective actions.

addresses: CWE-502

Evaluation of untrusted data handling (deserialization testing) reveals unsafe processing, which the required remediation process addresses.

addresses: CWE-502

Untrusted serialized data can be deserialized and observed inside the chamber, blocking gadget-chain exploitation outside the sandbox.

addresses: CWE-502

Validates or rejects untrusted serialized data before deserialization occurs.

addresses: CWE-502

Identifies and blocks malicious code introduced through deserialization of untrusted data at system boundaries.

addresses: CWE-502

Integrity verification of serialized information can detect tampering before deserialization occurs.

addresses: CWE-502

Provenance of associated data allows detection of untrusted sources before deserialization or processing occurs.

MITRE ATT&CK Enterprise TechniquesAI

T1672 Email Spoofing Stealth
Adversaries may fake, or spoof, a sender’s identity by modifying the value of relevant email headers in order to establish contact with victims under false pretenses.
Why these techniques?

Deserialization flaw in Outlook directly enables email spoofing attacks over the network with no user interaction required.

Confidence: MEDIUM · MITRE ATT&CK Enterprise v18.1

NVD Description

Deserialization of untrusted data in Microsoft Office Outlook allows an unauthorized attacker to perform spoofing over a network.

Deeper analysisAI

CVE-2026-21511 is a deserialization of untrusted data vulnerability (CWE-502) in Microsoft Office Outlook. Published on 2026-02-10T18:16:33.337, it carries a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N). The issue enables an unauthorized attacker to perform spoofing over a network through processing untrusted data.

The vulnerability can be exploited by any unauthorized attacker with network access, requiring low attack complexity, no privileges, and no user interaction. Successful exploitation allows the attacker to achieve spoofing, with a high impact on confidentiality but no impact on integrity or availability.

Mitigation details are available in the Microsoft Security Response Center advisory at https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21511.

Details

CWE(s)

Affected Products

microsoft
365 apps
all versions
microsoft
office
2019
microsoft
office long term servicing channel
2021, 2024
microsoft
sharepoint server
2016, 2019 · ≤ 16.0.19127.20518
microsoft
word
2016

CVEs Like This One

CVE-2026-20948Same product: Microsoft 365 Apps
CVE-2025-47994Same product: Microsoft 365 Apps
CVE-2025-21364Same product: Microsoft 365 Apps
CVE-2025-53733Same product: Microsoft 365 Apps
CVE-2026-26113Same product: Microsoft 365 Apps
CVE-2025-24079Same product: Microsoft 365 Apps
CVE-2025-53770Same product: Microsoft Sharepoint Server
CVE-2025-54897Same product: Microsoft Sharepoint Server
CVE-2025-49712Same product: Microsoft Sharepoint Server
CVE-2026-20963Same product: Microsoft Sharepoint Server

References